• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Critical Infrastructure   »   Use of Pagers in ICS Pose Challenges

Use of Pagers in ICS Pose Challenges

  • Posted on:October 25, 2016
  • Posted in:Critical Infrastructure, Mobile Security, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In a follow-on report to our recent one involving the use of pagers in healthcare, Trend Micro Forward-Looking Research (FTR) team also analyzed the use of pager communications in industrial environments.  This report will look at how and why these environments still utilize pagers and the potential security concerns due to this unencrypted channel.

The research looks at a number of areas in which pagers are still used like Industrial Control Systems that are used in all sorts of industries from Energy, Manufacturing, and Transportation.  We also delve into Business Automation Systems which manages many aspects of a buildings operations and how pagers are used in many of the alerts generated within these systems.

The researchers discuss some real-world examples of what pager communications were found during their in-the-field research of a number of industries including power generation (Nuclear Power Plants), Chemical plants, and even Semiconductor companies.

From Passive Intelligence gathering to spoofing pages to possible attack scenarios, this report is intended to be a wakeup call to any organizations still using pagers for communications and includes recommendations for how to tighten up the security of this communication channel.

Related posts:

  1. Why you Should Dig Into Our Mining Threat Paper
  2. Data Protection Risks of Using Pagers in Healthcare
  3. Leaking Pagers – How Insecure Tech Can Leave Your Organization Hopelessly Exposed
  4. Study: Next-generation computing environments pose new risks

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.